Best Knomi Alternatives in 2024
Find the top alternatives to Knomi currently available. Compare ratings, reviews, pricing, and features of Knomi alternatives in 2024. Slashdot lists the best Knomi alternatives on the market that offer competing products that are similar to Knomi. Sort through Knomi alternatives below to make the best choice for your needs
-
1
Cisco Duo
Cisco
1,285 RatingsSecure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix. -
2
Udentify
Fraud.com
12 RatingsKnow the real identity of your customer, user, or employee with the Udentify Identity Verification and Biometric Authentication solution. Challenges we solve: - Identify verification - Onboarding - New account opening - Age verification - Fraud prevention - Biometric authentication - Passwordless authentication - Strong customer authentication - KBA replacement - KYC and AML compliance Udentify is iBeta Level 1 and Level 2 certified, quickly integrates into your website or mobile app and lets your users navigate from a desktop to a mobile experience as desired. -
3
MIRACL
17 RatingsProtect your users. Make their journey easier. MIRACL Trust provides a safer and smoother authentication experience. Only one step. No passwords. No problem. Multi-factor authentication is slow and cumbersome. MIRACL is a safer and more efficient alternative to traditional MFA. Logging in takes only 2 seconds and error rates as low at 1/10th of passwords. No passwords necessary. All you need is a PIN and you are in. Our cryptographic technology ensures that users' information is always safe. MIRACL Trust provides a simple login experience that puts users first and makes it easy to roll out your data quickly. -
4
Auth Armor
Auth Armor
FREE for 10,000 active users! 4 RatingsYou can harness the power of biometrics to make authentication simple for any website or application. This will allow you to create a new way to log in and authenticate online. You can authenticate your users using their smartphones with 2-factor and passwordless authentication. Auth Armor provides secure authentication for every user. It does not require weak passwords or complicated codes. We have created powerful APIs, SDKs and libraries that allow you to create what you want, however you want it. You can use our tools to add authentication to any app using any flow. We offer protection for workers and consumers, so you have the power and flexibility you need to secure any information. Auth Armor is the most efficient mobile authentication system available. Instant push messaging is available to users' devices, enabling them to log in and authenticate quickly. -
5
Ping Identity
Ping Identity
$5 per user per monthPing Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow. -
6
Ondato offers identity verification, business onboarding, customer data platform, due diligence, and authentication solutions tailored to fit in your everyday workflow. Our tools fit the entire customer lifecycle management, starting from onboarding and ending with continuous user monitoring. It's a one-stop solution whether you're worried about compliance or are looking for a more user-friendly data management platform.
-
7
Nexa|Voice
AWARE
Voice is an SDK that offers biometric speaker recognition algorithms, software libraries, user interfaces, reference programs, and documentation to use voice biometrics to enable multifactor authentication on iOS and Android devices. You can match and store biometric templates on either a mobile device or a server. Voice APIs are reliable, configurable, and easy to use, complemented by a level of technical support that has helped make Aware a trusted provider of quality biometric software and solutions for over twenty-five years. High-performance biometric speaker recognition allows for secure and convenient multifactor authentication. The Knomi mobile biometric authentication platform is a collection biometric SDKs that run on mobile devices and a web server that enable strong, multi-factor, passwordless authentication using biometrics. Knomi offers multiple biometric modes, including facial recognition. -
8
Veridium
Veridium
Veridium is an AI-based Behavioral biometrics-powered Integrated Identity Platform that provides multi-factor authentication (MFA), digital ID verification and a truly enterprise-grade passwordless experience to employees and customers. It is low code, flexible, and agile. Customers can forget their passwords. This eliminates friction and provides greater security for online connections. We offer a single-step multi-factor authentication solution that offers increased security. Organizations also get higher levels of identity assertion. Veridium provides an end-to-end authentication platform that can handle all your WFH requirements and any VPN solution. It delivers strong, multi-factor, passwordless workforce authentication. -
9
Onfido
Onfido
How can you verify that real people are online? Onfido helps companies identify real identities using the help of AI and identity experts. With just an ID and a picture, your customers can prove their identity wherever they are. You'll be able to secure your business and have all the information you need. Your user's digital account can be linked to their real identity using only their ID and their face. You can then re-verify your user's digital account or authenticate them with a selfie. Onfido's identity authentication has helped businesses like yours to onboard more users and reduce fraud while freeing up resources for their internal teams. Identity verification and authentication can help you drive business results. Our AI-based technology determines if a user's government-issued ID has been authenticated or fake, and then compares it with their facial biometrics. This is how we provide companies with the security and assurance they need to securely and remotely onboard customers. -
10
FacePhi
FacePhi Biometria
The best solution for digital authentication, onboarding, and security, combining different biometrics and antifraud system of FacePhi. Combination of biometrics and other security systems that creates an integrated digital onboarding and identity authentication system that allows you to access, verify, and operate various services and products in mobile or web applications. This framework allows our client to choose which components they want to activate, resulting in a seamless user experience. Face recognition is a way to identify a person by analysing their face. Face recognition is not intrusive, unlike other biometrics like fingerprints or iris. It does not require the user to cooperate. It only needs to capture the face using a webcam. -
11
RSA SecurID
RSA Security
2 RatingsRSA SecurID allows organizations of all sizes to reduce identity risk and ensure compliance without compromising user productivity. It provides users with easy access to their information and confirms that they are who they claim to be. RSA SecurID also provides unified visibility across all organizations' islands of identity and control. RSA SecurID combines multi-factor authentication with identity governance to address security concerns associated with providing easy access to dynamic user populations in complex environments. It assesses risk and business context to provide access and identity assurance. Digital transformation presents new challenges in authentication, access management, and identity governance for organizations. As a result, more users require access to more systems via more devices than ever before. RSA SecurID is a tool that helps organizations address these issues and protect their identity. -
12
LoginID
LoginID
FreeLoginID's SKDs and APIs allow sites and apps to easily integrate our FIDO/FIDO2-certified multi-factor authentication solution. By leveraging the native biometrics on the end user's device, our platform creates a private/public key pair that enables strong customer authentication. The end user does not need to install any additional apps and the private key never leaves the secure area of their device. LoginID's transaction confirmation service is perfect for online merchants because it prompts a biometric action for each transaction which is then cryptographically signed. We are in alignment with PSD2, GDPR, CCPA, and HIPPA standards. LoginID has SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin. -
13
Entrust Identity as a Service
Entrust
Cloud-based identity management (IAM), which includes multi-factor authentication (MFA), credential based passwordless access and single sign-on (SSO). Cloud-based multi-factor authentication provides secure access to all your users' apps, networks, devices, and accounts. Optimal user experience is achieved through adaptive authentication, proximity-based login, and adaptive authentication. Happy users won't try to bypass security measures. Everyone wins. This is easier than any other thing you have tried. The work-saving features, such as built-in provisioning tools, on-premises integrations, and cloud integrations, reduce the IT workload from deployment to everyday management. To move forward faster, you need strong IAM. Cloud-based Identity as a Service scales rapidly to accommodate new users, expanding use case, and evolving security threats. -
14
Bravura OneAuth
Bravura Security
Protect your organization immediately from brute force and phishing attacks. Get rid of passwords with Bravura OneAuth powered HYPR. Your workforce will enjoy a passwordless sign in experience that is fast, simple, and significantly increases security across your security infrastructure. Bravura OneAuth uses one touch biometrics to act as access points, making authentication for your workforce as simple as unlocking a mobile phone and significantly more secure that traditional Multi-Factor Authentication. It replaces the inefficient and slow-to-implement MFA methods. Passwords are removed completely from the solution to reduce the chance of compromised credentials. -
15
HYPR
HYPR | The Passwordless Company
$4.00 per user/month HYPR is The True Passwordless Company with cutting edge technology and backed up by major investment partners. The HYPR Cloud Platform allows Passwordless Authentication across an enterprise workforce. It combines the security and convenience of a smartcard with the convenience of a smartphone. With HYPR, businesses can eliminate customer passwords and provide a superior login experiences for your customers as well. Consumer-grade usability increases the productivity of your employees and reduces friction for your customers. -
16
Incognia
Incognia
Location Behavioral Biometrics We create a dynamic location fingerprint by using the unique location behavior pattern of each user. This makes it very difficult for fraudsters or forgers to copy or forge. Incognia's location-based fraud solutions are designed to help financial institutions and retailers prevent account fraud and account takeover. Our precise location technology uses network signals and on-device sensors data to create unique behavioral patterns that allow users to be identified and authenticated. Our solution does not require PII and works in background to provide a secure and frictionless experience. -
17
AU10TIX
AU10TIX
AU10TIX is an Israeli identity management company. It is based in Israel. Their mission is to eradicate fraud and create a safer and more inclusive world. The company offers critical, modular solutions that verify and link digital and physical identities to ensure businesses and customers can connect securely. AU10TIX has been a preferred partner for major global brands in customer onboarding and customer verification automation over the past decade. AU10TIX elevates authentication and verification to a new level of scalability. Deep learning is all about the input. The more you feed it, it becomes smarter. This allows you to scale consumer onboarding, and exponentially scale your company. Fortune 500 companies can rely on AU10TIX to eliminate fraud and focus on growth. -
18
ID R&D
ID R&D
Biometric authentication and liveness detection are frictionless. ID R&D leverages the power of AI and biometrics to transform user experience. It's surprising how easy it is. Significantly safer. ID R&D combines extensive research into biometrics with advancements in AI to produce award-winning voice and face biometric authentication software. Our mission is to make authentication both more secure and frictionless. ID R&D technology can be used with traditional and digital interaction channels, IoT devices and embedded hardware. Software null that can verify voice messages using text dependent and text-independent methods. Accurately detect fraud attempts using recorded, synthesized, or converted voices null. The first ever completely passive facial liveness detection software - iBeta certified, ISO 30107-3. Keystroke detection and other keystroke detection allow for continuous verification of mobile and web users. -
19
Regula
Regula
Regula is a global manufacturer of forensic devices as well as identity verification solutions. Regula has over 30 years of experience in forensic investigation and the largest collection of document templates anywhere in the world. This allows Regula to create breakthrough technologies in document verification and biometric verification. Regula software and hardware solutions enable over 1,000 organizations and 80 border control authorities worldwide to provide top-notch customer service without compromising safety security and speed. -
20
DigitalPersona
HID Global
DigitalPersona®, software, allows you to go beyond multi-factor authentication. Expand to risk-based authentication, secure all applications, provide frictionless access, and deploy quickly. Industry-leading biometric solutions can improve security. Processes can be simplified, streamlined, and queues shortened to confirm identities for a variety of military, criminal justice, and citizen applications. Choose from a variety of U.are.U®, readers, modules, and sensors. The most advanced fingerprint technologies available to meet your OEM, retail, hospitality, and commercial identity management needs. -
21
Sima
Active Witness
FreeSima does more than keep bad guys out. Sima is a cloud-based Access Control reader that is highly secure and yet easy to use. Sima can read both facial biometrics and mobile credentials (QR codes). This cloud-based integrated software can issue single (QR only), and multi-factor (facial verification) codes for highly secure and customized facility access. We respect your privacy. To perform facial authentication, we use facial recognition technology. This technology allows us to verify identity, and allow access to a specific location. Only for identification purposes, facial data will be stored on our servers. We will not share your personal data, including your face image, with any third parties. -
22
iProov
iProov
Remote users can be authenticated online using Genuine Presence Assurance for verification and onboarding. Organizations that use iProov's biometric authentication to authenticate or onboard are seeing significant benefits. US Government Penetration Review has given a clean bill of health. Unique active threat management system that certifies resilience. No matter what platform, format, or device you use, this system is independent. iProov is the global leader in Genuine Presence Assurance. Our unique technology is used by banks, governments, travel agencies, and healthcare providers all over the globe to verify the online identity and health of citizens and customers more securely than ever before. GDPR compliant & eIDAS accredited. Credentials are not stored on devices. The most secure organizations in the world use this device. Five continents have been covered. Millions of authentications delivered worldwide -
23
Secfense
Secfense
Secure your company, employees, and customers with stronger authentication. 2FA can be deployed in minutes and not weeks. 2FA (and other user access policies) are built into the infrastructure and not fixed to applications. Allowing the use of all 2FA methods on the market, now and in the future, without changing the core. Protection is available to all employees, including those who work in the public, private, and on-premise sectors. Secfense is installed between your users and the applications they access. It tracks traffic patterns that are related to authentication. It can then enforce multifactor authentication logon and other sensitive actions, without interfering in applications existing code or databases. The platform always has the most current 2FA methods. Secfense and applied methods are not affected by application changes. You can control session expiration rules across all applications. Do not rely on VPNs. Instead, trust users and their devices. -
24
ThumbSignIn
ThumbSignIn
$3 per user per monthWe have you covered, no matter what channel or device. You can choose from a variety of user-friendly authentication options, including passwordless biometrics and 2FA, to find the right authentication solution for your business. To improve security and user experience, start with 2FA. Then move on to biometrics-based authentication. Our SaaS-based authentication service, RESTAPs, mobile SDKs, and UI widgets offer a powerful combination software components that can all be used to create omni-channel authentication experiences across mobile, web, phone and IoT. It's time to remove the security burden from users! Our mission is to make the digital world more secure and open up access to strong authentication technology. ThumbSignIn is a SaaS-based service that helps companies choose the best way to enhance their existing systems with two factor authentication (2FA). -
25
TrustLink
AarateK
TrustLink™, a high-performance platform for biometric authentication, supports facial and fingerprint recognition on a large scale. It is a powerful platform with multi-biometric technologies that can be used to capture fingerprints and facial images, register them, identify them, and authenticate them. It also provides APIs on both the server and client to allow for rapid development and deployment of a wide variety of applications. TrustLink™, equipped with Aratek Bione® dynamic optimization algorithms and TrustFace™, face recognition algorithms, is specialized in large-scale fingerprint recognition and face recognition applications. TrustLink™, a biometric identity authentication platform, is ideal for software developers. -
26
FaceOnLive
$0 25 RatingsWelcome to FaceOnLive, your trusted provider of fully On-Premises Biometrics & ID Verification Solutions. Our advanced suite of services encompasses state-of-the-art technologies including Face Recognition, Face Liveness Detection, ID Document Recognition, ID Document Liveness Detection, and Touchless Fingerprint Recognition. With a focus on security, accuracy, and convenience, our solutions empower businesses to enhance customer onboarding processes, strengthen access control measures, and mitigate fraud risks effectively. Whether in banking, healthcare, government, or beyond, FaceOnLive delivers tailored biometric solutions to meet your organization's unique needs. Elevate your security standards, streamline operations, and build trust with your customers through cutting-edge biometric authentication. Join us as we pioneer the future of identity verification and authentication. -
27
Wink
Wink
$499 per monthWink allows any institution to offer a superior experience in identity and payments through biometrics. Wink's platform offers facial and voice recognition based multi-factor authentication, payments, and can eliminate passwords and other technologies that are device or memory-based. Integrate Wink streaming checkout to eliminate fraud using our unique voice- and face-based user recognition. Improve conversions and eliminate cart abandoned by simply smiling at the consumer to check out. Long checkout forms and forgotten logins are a thing of past. The industry's very first multi-factor authentication combines the convenience of face-id with the security of digital voice printing. Our unique, patented, one-way anonymous encryption ensures privacy protection. The unique Wink ID represents a user's voice and face data as a 3-D model. -
28
FortressBA
Fortress Identity
A mobile and web-based biometric user authentication solution can help you strengthen security and eliminate passwords. Fortress Identity introduces a biometric API to simplify secure authentication. Voice authentication can be implemented directly in the browser. You can also expand the API to include the user’s smart phone for multi-factor authentication. Secure account access and transaction authorization -
29
Jumio
Jumio
Businesses are finding it increasingly difficult to trust that an individual is who they claim to online, as identity theft and account takingovers are on the rise. Jumio's identity verification and eKYC solutions use the Jumio KYX Platform. It leverages biometrics, AI, and the most recent technologies to quickly and easily verify the digital identities both of new customers as well as existing customers. Jumio offers a seamless and intuitive user experience, which takes less than one minute to complete. Jumio supports more languages and document types than any other software. Jumio seamlessly integrates with websites, iOS and Android apps via APIs, SDKs, webcams, and webcams. It integrates quickly into your website or mobile application and allows your users to switch between a desktop and mobile experience as needed. All data is encrypted with strong AES256-bit encryption and is sent and stored securely. Jumio is PCI DSS Level 1 certified, which demonstrates how serious we take data security. -
30
Facia
Facia.ai
Facia, founded in 2022, specializes in facial recognition and biometric authentication technology. We use advanced AI and ML algorithm to deliver secure solutions for business. Our 3D liveness technology provides rapid responses in less than a second. We achieve a 0% false acceptance rate (FAR) and a FRR below 1%, to prevent unauthorized entry. Our services include 1:N Face search, 1:1 Photo ID verification, and age verification. We offer customizable SDK and API integration options to ensure seamless compatibility. Our system allows for real-time 3D facial verification, which ensures speed and accuracy without compromising security. We protect against mask and print-based spoofing. Facia is committed to the advancement of biometric authentication and providing secure identity verification for businesses. -
31
EKEMP ABIS
EKEMP
EKEMP ABIS is a large-scale biometric verification system that supports fingerprint, face, and iris biometrics. The highly modular architecture of the software makes it easy to customize solutions to your business processes. ABIS is a solution that can be used for large projects, such as national identification card and social welfare, border controls, elections (voter verification and registration), criminal investigations, finance, etc. -
32
IDcheck
IDcheck
IDcheck specializes in cloud-based, automated Biometric Identification Screening, Fraud Detection, and KYC-AML. We authenticate global identity documents using advanced AI and OCR through our proprietary Facial Recognition and Frictionless Lifeness and Motion Detection algorithms. Fake IDs are difficult to spot for professionals. Fake IDs are not detected by professionals. All background screening on the person who passes must be done on the real person. Organisations are at risk of fraud and AML violations. Logging in to IDcheck is much safer than SMS verification. Key-Based 2-Factor authentication is used. The "pin" is not transmitted or stored. The pin will fail if the device is lost or stolen. However, a Key-Based 2-Factor Authentication system can detect the pin even though it is stored and transmitted. Multiple industry-specific automated portals are available with strict access management, permissions, and internal controls. This includes sanctions and checks for credit & wealth sources. -
33
Innovatrics ABIS
Innovatrics
Innovatrics ABIS supports facial recognition, fingerprint, iris, and fingerprint identification. With minimal hardware requirements, you can achieve fast and accurate performance. Our ABIS can be customized easily due to its modular architecture. Open APIs make it easy to integrate with other systems and avoid vendor lock-in. Our ABIS has been successfully deployed to hundreds of large-scale biometric projects, including the most complex biometric systems in the world. Our fingerprint, facial, and iris recognition technology allows you to quickly find a solution that suits your business processes. Based on independent NIST testing, our algorithms are consistently ranked amongst the best. You can create an identity management solution that is tailored to your requirements using our ABIS modules. You can add modules or upgrade as needed. We offer flexible licensing policies to meet the needs of every project. -
34
Keyless Authenticator
Keyless Technologies
2 RatingsNothing to forget. Nothing to steal. You are the key. To protect your remote workforce, adopt zero-trust authentication. This will allow you to enable strong customer authentication with just one glance. Anywhere. Anytime. Any device. To eliminate fraud, phishing, and credential reuse, embrace passwordless, multifactor authentication. This will enhance customer and employee experience and protect their privacy. Unique technology enables you to achieve unique capabilities. Hardware Agnostic. Keyless does not rely on any device hardware or sensors. Keyless can be deployed on many devices and appliances. Eliminating passwords can help you achieve better results for your company. Top-Notch Security No central honeypot, no data on user devices. Data cannot be stolen or lost, as no private information is available to anyone except the user. Passwordless passwords can reduce password-related costs. Password Reset Costs. The average helpdesk labor price is $70 -
35
TrulySecure
Sensory
The fusion of voice and face biometric authentication creates a highly secure and hassle-free experience. Sensory's speaker verification, face recognition, as well as biometric fusion algorithms, leverage Sensory’s deep strengths in speech processing, machine learning, and computer vision. This unique combination of voice and face recognition ensures maximum security while remaining fast, convenient, and easy to use. It also guarantees the highest verification rates for the user. Biometrics are more convenient than other methods and not only provide security. Some biometric solutions may accept false positives, which is known as "spoofing". Sensory's innovative approach uses passive face liveness, active vocal liveness, or a combination thereof to leverage a deep learning model that almost eliminates fraudsters using 3D masks and photos. -
36
iCrypto
iCrypto
FreeThe iCrypto SDK is designed to work with all of our iCrypto cloud services. It can be integrated into existing Enterprise Apps, or deployed as iCrypto App and used as a standalone password-less verification solution. The iCrypto SDK combines the most recent cryptography technologies with device-level security management to create a software token that can be used in a variety of industries as a biometric ID while on the move. iCrypto SDK offers authenticator PKI signatures and a range cryptographic protocols like TOTP/HOTP/OCRA/MTP. It also provides push-based authentication, network-based biometrics such iris scan, fingerprint, face/voice recognition, third-party authorizations, secure storage, context collection, and a host of security features. -
37
VoiSentry
Aculab
This VM image can be deployed on any platform, including cloud, data center, and hardware servers. APIs allow core enrolment, verification, and give your application complete control over the overall process operations. VoiSentry uses a cluster-based architecture, which provides scalability and robustness that is future-proofed. You can also choose to host VoiSentry on-premise or in the data center. Our voice biometric engine is easy to use and offers enterprise-grade security. This creates a great client and business experience. MFA is becoming more popular to protect customer data and financial resources from identity theft. Voice biometrics provides a secure authentication method that is spoof-resistant. Voice biometrics can also be used to create voice signatures. This is a legally binding method for underwriting documents like life insurance policies. -
38
MiniAiLive
MiniAiLive
lifetime license 16 RatingsMiniAiLive provides Touchless Biometrics Authentication and ID Verification solutions. We offer security solutions that are based on cutting-edge technologies such as facial recognition, liveness detection and ID document recognition. We also ensure that our solutions are seamlessly integrated with the existing systems of our clients. MiniAiLive is a face recognition app that provides reliable and secure access control solutions. It also includes a passive liveness detection layer. Our app ensures only authorized individuals have access to sensitive areas, services, or accounts. It also minimizes the risk of unauthorized entry through spoofing and impersonation attempts. -
39
authID.ai
authID.ai
Mobile facial biometrics can be used to provide seamless identity fraud protection throughout the digital identity lifecycle. Easy customer onboarding. Get rid of the bad guys quickly. Account takeovers and identity fraud can cause account and transaction compromises. Cloud-based biometric authentication for high-risk transactions provides greater assurance. Eliminate passwords using FIDO2 strong authentication linked to a trusted ID. Remotely confirm the identity of new users. This will allow you to be certain that they are who they claim to be. Our mobile biometric solutions allow you to quickly onboard customers and verify their identity. They also help protect their accounts from identity fraud or account takeover. Learn how authID helps you transform identity management. -
40
PortalGuard
BIO-key International
BIO-key PortalGuard IDaaS, a cloud-based IAM platform, offers the most flexible options for multi-factor authentication and biometrics. It also allows customers to reset their passwords and provides a user-friendly interface. All this at a reasonable price. PortalGuard has been trusted by many industries, including education, finance, healthcare, and government, for over 20 years. It can be used to secure access for employees and customers, regardless of whether they are on-premises or remote. PortalGuard's MFA is unique because it offers Identity-Bound Biometrics with the highest levels of integrity and security. They are also more accessible than traditional authentication methods. -
41
Bayometric
Bayometric
Bayometric's Biometric single sign-on software (SSO), is a strong authentication solution that manages identity and passwords. It makes it easier for users to connect to their computers or networks. Enterprise Single Sign On allows users to securely connect to the enterprise. It is a cost-effective, server-based back-end that provides enterprise-wide identity management. IT departments can easily deploy and manage it. Create a password-free environment by logging in to Windows, domains, websites, and applications with fingerprints Centralized user enrollment, credentials & access rights management. Easy client component installation via AD group policy. The SSO portal offers organizations an integrated strong authentication and identity management system that can be easily integrated into their existing infrastructure. -
42
ImageWare Authenticate
ImageWare Systems
Biometrics can increase the reliability of user access management. Authenticate is simple to use and easy-to-implement. It provides user assurance across all enterprise applications and customers. You can quickly add your existing environments to Authenticate and use its self-enrollment function to get users up and running. Users can choose the most convenient option among the available modalities for simple passwordless login. To provide more secure authentication, you can make it mandatory that the user uses two or more modalities. Facial authentication: Users can use a laptop or mobile phone webcam to take a selfie. The highest level of authentication, especially when combined with NIST compliant Biointellic Anti-Spoofing tech. Voice Recognition: Users speak a random phrase, usually using a mobile telephone. -
43
OpenOTP Security Suite
RCDevs
€1.85/User/ M OpenOTP Security Suite is an enterprise-class security solution for two-factor authentication with U2F/OTP, federation and identity management (IAM). The solution combines mobile technologies with proven security standards to provide the best alternative for business and non-business users who need cost-effective solutions that support their users' mobility. It enables integration of a variety of third-party products and systems with MFA, even if they only support LDAP as an authentication backend. Try OpenOTP Security Suite if you are interested in: USER MOBILITY | PRIVACY | VPN AND WIFI SECURITY | SSO AND ADFS | FINE-GRAINED AUTHENTICATION POLICIES | ALL-IN-ONE SECURITY SOLUTIONS | EUROPEAN DATA STORAGE OpenOTP Security Suite is an enterprise-class European security solution designed for installation on-premises or in a private cloud. ++ Free Token App (and compatible with most existing hardware and software tokens) ++ Free 30-day Trial ++ Freeware (<25 users) -
44
LexisNexis Voice Biometrics
LexisNexis
LexisNexis Voice Biometrics can be used to authenticate companies and government agencies that process high-risk transactions remotely or in a call center environment. A voice biometric (or "voiceprint") is as unique to an individual than a fingerprint. It uses the sound, rhythm, and pattern of an individual's vocal to determine their identity. LexisNexis®, Voice Biometrics offers a higher level of security for remote transactions that are high-risk and has little or no impact on customer experience. LexisNexis®, Voice Biometrics improves operational security and customer experience, while significantly reducing costs and risk associated with remote authentication. This advanced voice biometric-based authentication solution, when combined with our identity proofing products, gives businesses and government agencies one source for authenticated enrollment as well as repeat user authenticated access the contact center. -
45
Touch N Go
Bayometric
Touch N Go - A fast, secure and simple way to integrate biometric fingerprint ID into your solution using just FOUR lines code. For seamless integration, a reliable, scalable and high-performing biometric identification solution. Easy implementation and maintenance of fingerprint recognition with minimal learning curve for developers. It provides the best-fit identity solution for workflows that require high security. This keeps developers happy, productive, and IT in control. Organizations can have a cost-effective, turnkey biometric identification system that leverages proven technologies. This allows them to focus on their core business operations. -
46
Q5id
Q5id
A proven, universal identity that protects consumers and businesses from identity fraud. Everyone's identity should be protected. Every business should know its customers. Enrolling customers or employees in the Q5id patented identification proving system will help you reduce fraud in your company. Are you looking to improve your business' identity assurance? We can help you protect your business from identity fraud by enrolling in Q5id. To prove your customers' identity, you can use a simple mobile app. Your customers can use Q5id anytime, anywhere to authenticate transactions once they have enrolled. Customers can enroll in Q5id to prove their identity and meet Know Your Customer (KYC), while also ensuring that accounts comply with NIST-recommended security measures. -
47
Nexsign
SAMSUNG SDS
Mobile security that is uniquely yours: Get stronger mobile security Nexsign is the next step in mobile security. Nexsign™, which is not as secure as a password and can be easily forgotten, duplicated or duplicated, verifies your identity using biometric information that includes your fingerprint, voice, and face. The result? The result? An authentication experience that is simpler, faster, and more secure. No more long, complicated passwords! Accessing data can be as easy as recognizing your fingerprints, face, or voice. You can rest assured. Nexsign™, will not store your biometric data on the server. There is no risk of biometric data being leaked because Nexsign™ uses Public-Key Infrastructure (PKI) to authenticate users. Biometric authentication is only the beginning. Nexsign™, which can be used on a variety of platforms and environments such as Mobile OTP and PIN authentication, is also possible. It's now simple and easy to deploy solutions with standard development toolkits, APIs and a web-based admin portal. -
48
ActivID
HID Global
Flexible, flexible, and highly scalable platform that allows you to secure access to corporate systems and online consumer services. Multi-factor authentication to secure remote access by employees to corporate VPNs, and other enterprise resources. Multi-factor authentication to secure remote access by employees to corporate VPNs, and other enterprise resources. Rapidly create and deliver authentication solutions to ensure compliance and trust. Secure authentication using smart cards to protect workstations, mobile devices, and networks. Solution for issuing and managing PIV, PIV-I and enterprise access cards, mobile credentials, and managing PIV cards. HID PIV IDMS enables identity verification and securely issues credentials, even to remote users. Securely and efficiently issue a card through the Leverage Service Bureau. -
49
Callsign
Callsign
We are an identification fraud, authorization and authentication company that solves the problems that organizations face in getting users onto their digital platforms. Innovative solutions often focus on technology's capabilities and don't give the applicability to all users the same weighting. Our engineering team has over 300 years of combined experience in making software work for everyone. They come from both a banking and ecommerce background. We are proud to be able to assist some of the largest banks in the world and offer the same "bank-grade" identification solutions to clients of all sizes, public and private. Callsign allows your users to move on with their digital lives in the easiest way possible. We make it easy for them to do so. Our Intelligence Driven Authentication recognizes users using deep learning insights - derived from device, location, and behavioral data. -
50
OARO Identity
OARO
Advanced facial recognition allows us to connect people with their identities, simplifying the processes for large enterprises of all sizes. OARO IDENTITY provides an end-to-end solution that allows user authentication and authorization across devices and business lines. This reduces cost and complexity, while improving security and user experience. All organizations need to manage their identity and protect their data. Traditional solutions are no longer able to provide the user experience and security required in today's business environment. This is evident in the increasing frequency of data breaches by industry leaders and the government. OARO IDENTITY provides an end-to-end solution that allows clients to authenticate and authorise users across devices, business lines, and organizational boundaries. It also reduces complexity, costs, and improves user experience and security.